Pokemon Go Malware and Zero Day iOS Attacks: Mobile Threat Defense

Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.

The cost of Business Email Compromise (BEC), and Impostor email has risen to $5.3B and is impacting employees, business partners and customers of organizations around the world.

In order to protect all the groups that are targeted by BEC requires deep visibility into email, and the expertise to build and deploy email authentication policy. Proofpoint Email Fraud Defense (EFD) is designed to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
Join Richard Davis, Proofpoint, and Roy Murdoch to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.
Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
• Superior blocking of advanced threats
• Immediate threat visibility and rapid response
• Greater protection from compliance violations and information loss
• Uninterrupted access to live and historic email

To raise a question to Roy or Richard prior to the event email: O365questions@proofpoint.com

Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk?

Watch this webinar to learn:

· Hear about new types of risk this transformation introduces to your people and data
· Learn about the evolution of compliance requirements in the modern workplace
· Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.

Recent studies have found attackers using multiple different methods to impact higher education institutions. And email is the common culprit that enables these advanced threats to breach campuses. Attackers continue to evolve their techniques to bypass even the latest email security tools, leaving institutions to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Join this webinar to learn how to build an advanced email security strategy that gives you visibility into threats and empowers you to proactively protect your campus.

The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you effectively respond and remediate threats.

That’s where our Threat Protection for Microsoft Office 365 comes in.

Join us for a live demo and see firsthand how our solution can help you:

Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

Join us Thursday, July 27, 10 AM PT for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.

Learn about:

-- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
-- Approaches for identifying suspicious messages
-- The latest in security software to fight against advanced threats

Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.

Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.

More than 90% of targeted attacks start with email fraud. Learn how to gain insight into, and effectively defend against, these attacks.

Join us for a Proofpoint technical webinar, brought to you by engineers, for engineers. This session will focus on effectively defending your domains from impostors and fraudsters attacking your organization, your customers and your partners.

Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

Register now to learn about:
•The latest social engineering targeting trends and techniques
•Top email fraud tactics, including business email compromise (BEC) and social media account phishing
•The rise of fraudulent mobile apps and how criminals target users on the go

- Trends and implications for traditional network and endpoint DLP
- Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently
- Strategies on how to move forward to protect your critical data

Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

Register now to learn about:
•The latest social engineering targeting trends and techniques
•Top email fraud tactics, including business email compromise (BEC) and social media account phishing
•The rise of fraudulent mobile apps and how criminals target users on the go

Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

•Reduce exposure time to malicious emails
•Reduce the time to quarantine and contain email threats
•Reduce your dependency on custom-coded software

The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
• Latest impostor email trends including BEC and consumer phishing
• How to extend your current protection to stop all impostor threats
• Upcoming product integration with Email Protection to secure your entire email ecosystem

The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.

That’s where our Threat Protection for Microsoft Office 365 comes in.

Join us for a live demo and see firsthand how our solution can help you:

On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.

Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?

Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

•Block malicious emails spoofing your domains before they reach your employees and customers
•Monitor all emails (inbound and outbound) from your domains and those of third parties
•Accurately distinguish between legitimate emails and fraudulent emails

With the Petya ransomware attack following closely on the heels of WannaCry, security teams worldwide must reassess their ransomware-readiness.

What are best practices for preventing, detecting, and remediating ransomware attacks?

Watch this webinar for hard data and proven strategies for answering those questions. You'll learn:
• Details on the latest ransomware attacks, including WannaCry and its variants
• The most common challenges organizations face in combating ransomware
• Strategies for mitigating ransomware attacks of all varieties

Cyber attacks are increasing and diversifying—with new variations appearing all the time, many targeting new vectors. Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. This is the first in a series of three demos about our Email Protection Suite. Learn about:

•Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
•Approaches for identifying suspicious messages
•The latest in security software to fight against advanced threats

Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:
- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.